Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,405,915 Techniques for correlating vulnerabilities across an evolving codebase
Methods, apparatus, and systems for characterizing vulnerabilities of an application source code are disclosed. Steps for characterizing vulnerabilities include...
US-9,405,914 Data analysis system
A data analysis system for analyzing data from multiple devices has a database service module including a data storage subsystem storing data from collected...
US-9,405,913 Method for defending against cold-boot attacks on a computer in a self-service terminal
A method to defend effectively against cold-boot attacks includes checking state data stored in a state memory to which the system software has access. At least...
US-9,405,912 Hardware rooted attestation
Computing devices that perform hardware rooted attestation are described, as are methods for use therewith, wherein such devices include a system integrated TPM...
US-9,405,911 Method for secure booting of a printer controller
A printing system is provided with a secure boot program and a detachable memory device with an installable secure boot program. Upon switching on the printer...
US-9,405,910 Automatic library detection
The automated, real-time detection of specific blocks of code within a larger body of source code is described. Specific implementations relate to the detection...
US-9,405,909 Non-transitory computer-readable recording medium and information processing apparatus including shared library...
A non-transitory computer-readable recording medium includes a shared library that is executed by a processor. The shared library includes a preprocessing...
US-9,405,908 Systems, methods, and apparatus to virtualize TPM accesses
Embodiments of system, method, and apparatus for virtualizing TPM accesses is described. In some embodiments, an apparatus including a CPU core to execute a...
US-9,405,907 Method and apparatus of performing data executable integrity verification
Disclosed are an apparatus and method of verifying an application installation procedure. One example method of operation may include receiving an application...
US-9,405,906 System and method for enhancing static analysis of software applications
In a system for determining components of a software application from binary code thereof, one or more binary files are read without loading any...
US-9,405,905 Systems and methods for identifying associations between malware samples
Systems and methods are disclosed for identifying associations between binary samples, such as e-mail files and their attachments or a document and an...
US-9,405,904 Systems and methods for providing security for synchronized files
A computer-implemented method for providing security for synchronized files may include (1) synchronizing, using a cloud folder synchronization service, a...
US-9,405,903 Sinkholing bad network domains by registering the bad network domains on the internet
Techniques for sinkholing bad network domains by registering the bad network domains on the Internet are provided. In some embodiments, sinkholing bad network...
US-9,405,902 Anti-malware service in multi-tenant cloud computing environments
A host machine hosts virtual machines on a first logical layer, and a multi-tenant cloud computing environment on a second logical layer running on top of the...
US-9,405,901 Image processing system and log storage method
The terminal device include the file creation unit for storing a file including a public key in the external storage medium when the terminal device is...
US-9,405,900 Intelligent cyberphysical intrusion detection and prevention systems and methods for industrial control systems
The embodiments described herein include a system and a method. In one embodiment, a system includes a device monitoring component configured to measure control...
US-9,405,899 Software protection mechanism
Techniques for detecting malware activity are described. In some examples, a method for monitoring executing software for malware may include monitoring...
US-9,405,898 Secure element as a digital pocket
The disclosure includes a system and method in which one or more virtual resources are presented to a secure element; and the one or more virtual resources are...
US-9,405,897 Authenticating an entity
There is disclosed a method and system for use in authenticating an entity. An entity location history is stored comprising a historical record of locations...
US-9,405,896 Inter-application management of user credential data
A system and apparatus for enhancing the functionality and utility of an authentication process for web applications is disclosed.
US-9,405,895 Method of generating authentication patterns and authenticating system employing the same
An authenticating system includes an authenticating device, a background display device, a sensing device, and an authentication pattern checking device. The...
US-9,405,894 System, method and computer program for conducting transactions remotely with an authentication file
A transaction system and method is provided that ensures a high degree of non-repudiation. The transaction system may include a media conferencing terminal and...
US-9,405,893 Biometric authentication
A method comprising using at least one hardware processor for: providing a set of development supervectors representing features of biometric samples of...
US-9,405,892 Preventing spoofing attacks for bone conduction applications
Concepts and technologies are disclosed herein for preventing spoofing attacks for bone conduction applications. According to one aspect, a device can receive...
US-9,405,891 User authentication
There is disclosed a method for use in authenticating a user. The method comprises obtaining, by an electronic apparatus, a biometric input from a user...
US-9,405,890 Easy login on wearable device and wearable device applications
Embodiments of the present invention provide a method, computer program product, and computer system for login on a wearable device. The method includes...
US-9,405,889 Device, method, and system for augmented reality security
Devices and methods for authenticating a user of a mobile computing device to a content server include establishing a communication session between a target...
US-9,405,888 Methods, systems, and product for hashing using twisted tabulation
Methods, systems, and products describe a robust solution for the dictionary problem of data structures. A hash function based on tabulation is twisted to...
US-9,405,887 Limiting concurrent viewing sessions on multiple user devices
System devices include network interfaces to communicate with user devices associated with a user, memories for storing instructions to be executed by...
US-9,405,886 Method for determining cardiovascular information
A noninvasive patient-specific method is provided to aid in the analysis, diagnosis, prediction or treatment of hemodynamics of the cardiovascular system of a...
US-9,405,885 Drug discovery method
A method of obtaining information about a chemically active area of a target molecule, for example for drug discovery, comprising: providing a set of...
US-9,405,884 Methods and systems for the analysis of protein samples
The present invention relates to methods for analyzing protein samples, e.g., monoclonal antibodies, via the SITRS technique, as well as methods and systems...
US-9,405,883 Power rail for preventing DC electromigration
A method is disclosed that includes the operations outlined below. A first criteria is determined to be met when directions of a first current and a second...
US-9,405,882 High performance static timing analysis system and method for input/output interfaces
A static timing analysis method for input/output modes of an integrated circuit design, that includes loading the integrated circuit design described in a...
US-9,405,881 Cycle accurate state analysis with programmable trigger logic
In one embodiment, cycle-accurate information may be collected by stopping an input clock associated with a functional block of a SoC using a programmable...
US-9,405,880 Semiconductor arrangement formation
A method of forming a semiconductor arrangement is provided. The semiconductor arrangement includes an interconnection arrangement comprising a first connection...
US-9,405,879 Cell boundary layout
Some embodiments relate to a method of hierarchical layout design, comprising forming a layout of an integrated circuit (IC) according to a design rule that...
US-9,405,878 Generating a circuit description for a multi-die field-programmable gate array
A method for generating a circuit description for a multi-die field-programmable gate array, FPGA, comprising a first FPGA die and at least one further FPGA die...
US-9,405,877 System and method of fast phase aligned local generation of clocks on multiple FPGA system
An apparatus and method for fast phase aligned local generation of design clocks on a multiple FPGA system via clock generator replication is described. The...
US-9,405,876 Systems and methods for solving computational problems
Solving computational problems may include generating a logic circuit representation of the computational problem, encoding the logic circuit representation as...
US-9,405,875 Simulating effects of temperature on acoustic microwave filters
A method of designing an acoustic microwave filter comprises generating a proposed filter circuit design having an acoustic resonant element with a defined...
US-9,405,874 Time-domain signal generation
Methods and apparatuses disclose various embodiments of time-domain signal generation. In one embodiment a method includes receiving an input waveform having a...
US-9,405,873 Method for improved accuracy of a substrate parasitic-resistance extraction in a circuit simulation
By considering a Deep Nwell diffusing into a Pwell region, accuracy of a substrate parasitic-resistance extraction is improved. A well region of a semiconductor...
US-9,405,872 System and method for reducing power of a circuit using critical signal analysis
A system and methods provide for an analysis of at least a portion of an integrated circuit (IC) that comprises a plurality of modules, for the purpose of...
US-9,405,871 Determination of path delays in circuit designs
Determining delays of paths in a circuit design includes determining whether or not each path of the plurality of paths matches a path definition of a plurality...
US-9,405,870 Generating coverage data for a switch frequency of HDL or VHDL signals
The present invention relates to a method for generating coverage data for a switch frequency of HDL or VHDL signals with the steps of providing a HDL or VHDL...
US-9,405,869 Rubber product elastic response performance prediction method, design method, and elastic response performance...
An elastic response performance prediction method that employs a finite element analysis method to predict an elastic response performance expressing...
US-9,405,868 Systems and methods of numerically simulating structural behaviors of airbag made of coated fabric material
Methods of numerically simulating structural behaviors of airbag made of coated fabric material are disclosed. A special purpose finite element is configured to...
US-9,405,867 Hydraulic fracture simulation with an extended finite element method
A computer-implemented method includes defining respective positions of a first set of nodes and a second set of nodes in an enrichment region, and performing a...
US-9,405,866 Automating a microarchitecture design exploration environment
In a computing system running an environment for designing operation of circuitry, at least the following are performed for providing simulations and...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.